Security
Operating Systems
Software Troubleshooting
Operational Procedures
100

Which of the following provide the BEST security for a server room?

Badge Reader or Biometric Lock

100

A user called the help desk to report an issue with the internet connection speed on a laptop. The technician thinks that background services may be using extra bandwidth. What COMMAND-LINE tool should the technician should use to investigate connections on the laptop?

netstat

100

What happens with the protocol NTP?

Time Drift

100
A technician found that the employee is miming cryptocurrency on a work desktop. The company has decided that this action violates its guidelines. What policy should be updated to reflect this new requirement? 

AUP

200

Which of the following security methods BEST describes when a user enters a username and password once for multiple applications?

SSO

200

What Windows feature must be configured on Windows OS desktop in order to encrypts hard-drives on a laptop that you need a TPM chip for

BitLocker

200

A system administrator installed the latest Windows security patch and received numerous tickets reporting slow performance the next day. What should the administrator do to RESOLVE this issue?

Roll Back Updates 

200

What is used to identify potential issues with a proposed change prior to implementation?

Sandbox testing

300

A technician is working on a user’s workstation and notices a lot of unknown processes running in the background. The user informs the technician that an application was recently downloaded from the Internet. Which of the following types of infection does the user MOST likely have?

Worm

300

A user reports a PC is running slowly. The technician suspects its has a bad fragmented drive. What MMC Snap-In should you use?

msinfo32.exe

300

A user is attempting to make a purchase at a store using a phone. The user places the phone on the payment pad, but the device does not recognize the phone. What WIRELESS issue is happening to the user

NFC

300

A change advisory board did not approve a requested change due to the lack of alternative actions if implementation failed. What should the advisory board update before requesting approval again?

Rollback Plan

400

A company discovered that numerous computers from multiple geographic locations are sending a very high number of connection request which is causing the company's web server to become unavailable to the general public. What attack is occurring in the company?

Distributed denial of service (DDOS)

400

What Operating System can allow users have access to the source code, can host various server applications, and can be command line only?

Linux

400

You and your friend want exchange lecture notes during class. You have an iPhone while your friend has an iPad. What would be the EASIEST way to make the exhange?

AirDrop

400

What is the MOST important environmental concern inside a data center?

Humidity Levels

500

A technician is setting up a SOHO wireless network for a healthcare office that does not have a server. The user requires the highest level of wireless security and various levels of desktop authentication to access cloud resources. What authentication should the technician implement?

MFA (Multifactor Authentication) 

500

A technician is partitioning on a hard disk. The five primary partitions should contain 4TB of free space. What partition style should the technician use to partition the device?

GPT

500

Name 5 MALWARE removal steps?

1.Investigate & Verify

2. Quarantine infeceted Systems 

3. Disable System Restore in Windows

4. Remediate infected systems

5. Schedule Scans

6. Enable System Restore and create a restore  point

7. Educate the end user

500

A company installed a new backup and recovery system. What type of backups should be completed FIRST?

Full